357
Preventing attacks
Increasing productivity by identifying spam email
Related information
For further information related to this topic, see the following:
■
“Adding antispam protection to a rule”
■
“Understanding and using licenses”
Reducing false positives using a custom allow list
You can create a custom list of addresses or domains that are permitted to bypass the Email senders
identified as spam list, the subject patterns identified as spam list, and heuristic scanning. If the
envelope sender matches a domain or email address that is entered in the Email senders to allow list,
the email message is automatically delivered to the recipient. The message receives no further spam
processing.
Note:
Email messages from addresses or domains that are listed in the allow list are still processed for
content violations and viruses.
Ensure that you enable the senders list setting in the appropriate security gateway rule. You must also
have a valid Firewall Base license. If you do not, the security gateway does not attempt to use this
antispam scanning process.
Note:
This feature is only available for SMTP.
Prerequisites
None.
To reduce false positives using a custom allow list
1
In the SGMI, in the left pane, under Policy, click
Antispam
.
2
In the right pane, on the Configuration tab, to the right of the Email senders to allow list, click
Add
.
3
In the Senders Allowed dialog box, in the Sender address text box, type the IP address or fully
qualified domain name.
4
Click
OK
.
5
Optionally, do one of the following:
■
To save your configuration now and activate later, on the toolbar, click
Save
.
■
To activate your configuration now, on the toolbar, click
Activate
.
When prompted to save your changes, click
Yes
.
Related information
For further information related to this topic, see the following:
■
“About the antispam scanning process”
■
“Adding antispam protection to a rule”
■
Summary of Contents for Security 5600 Series, Security 5400 Series,Clientless VPN 4400 Series
Page 76: ...76 Managing administrative access Enabling SSH for command line access to the appliance...
Page 242: ...242 Defining your security environment Controlling full application inspection of traffic...
Page 243: ...243 Defining your security environment Controlling full application inspection of traffic...
Page 269: ...268 Limiting user access Authenticating using Out Of Band Authentication OOBA...
Page 373: ...372 Preventing attacks Enabling protection for logical network interfaces...
Page 509: ...508 Generating reports Upgrade reports...
Page 553: ...552 Advanced system settings Configuring advanced options...
Page 557: ...556 SSL server certificate management Installing a signed certificate...
Page 861: ...860 Index...